Fact-checked by Grok 2 weeks ago

Distributed Denial of Secrets

Distributed Denial of Secrets (DDoSecrets) is a United States-based 501(c)(3) nonprofit transparency collective founded in 2018 that archives and publishes hacked and leaked datasets in the public interest, operating with a small team of fewer than 20 individuals across multiple countries, many of whom remain anonymous. The organization has released dozens of terabytes of data from over 200 distinct leaks, including significant publications such as the 269-gigabyte BlueLeaks collection of U.S. law enforcement documents obtained from Anonymous in 2020, which encompassed emails, incident reports, and internal communications; terabytes of emails from Latin American mining companies exposed by environmental hacktivists in 2022; and a trove of Russian government and corporate documents in 2019 that highlighted internal operations. DDoSecrets' activities have contributed to journalistic investigations and government inquiries, such as analyses of police practices from BlueLeaks and exposures of corporate environmental impacts, while also prompting debates over the balance between transparency and privacy, particularly with its controversial archiving of ransomware victims' data that could inadvertently assist cybercriminals or expose sensitive victim information. In recent years, the group has expanded efforts to preserve historical leaks, including hosting WikiLeaks' content in an accessible format as of 2024, and continues to facilitate research on contemporary data dumps like extracted messages from a Signal-clone service in 2025, emphasizing its role as a non-hacktivist repository amid ongoing ethical scrutiny.

Founding and Organizational Overview

Origins and Establishment

Distributed Denial of Secrets (DDoSecrets) was co-founded in December 2018 by Emma Best, an investigative journalist and transparency advocate recognized for filing thousands of Freedom of Information Act (FOIA) requests on topics including national security and government accountability, alongside an anonymous collaborator known as "The Architect." Best, who had previously contributed to WikiLeaks and other transparency efforts, sought to address limitations in existing platforms by creating a decentralized collective focused on verifying and distributing leaked datasets that outlets like WikiLeaks had deprioritized or faced suppression on after 2016, emphasizing public interest over selective editorial curation. The group's establishment drew from Best's experience with FOIA litigation and archival work via platforms like MuckRock, where she amassed public records to expose systemic secrecy, extending this to hacked materials obtained from whistleblowers or activists to promote broader access without relying on corporate media gatekeepers. DDoSecrets positioned itself as a nonprofit transparency collective from inception, prioritizing source protection through technical measures like Tor and end-to-end encryption, while committing to vet datasets for authenticity and harm potential before release—criteria that, per Best, aimed to avoid unverified dumps that could undermine credibility, as seen in past hacks manipulated for disinformation. Initially operating as an informal network of journalists and technologists, DDoSecrets formalized its structure as a U.S.-based 501(c)(3) nonprofit, enabling tax-deductible donations to sustain server infrastructure for terabyte-scale archives; this status supported its mandate to enable "free transmission of data in the public interest" amid growing digital censorship by platforms and governments. The founding reflected a first-principles commitment to countering information monopolies, with Best citing risks of "being 2016-ed"—where leaks critical of powerful entities were algorithmically demoted or legally targeted—as a catalyst for building resilient, distributed publication channels. Early activities included rapid publication of Russian government leaks in January 2019, establishing its role as a conduit for materials shunned by mainstream outlets due to legal or political pressures.

Mission and Ideology

Distributed Denial of Secrets (DDoSecrets) functions as a transparency collective and 501(c)(3) non-profit organization in the United States, with a mission centered on archiving, publishing, and analyzing leaked and hacked datasets that serve the public interest. The group explicitly aims to enable the free transmission of data, positioning itself as a counter to institutional secrecy by distributing information that might otherwise remain concealed, much like a conceptual "denial-of-secrets" mechanism. This includes protecting sources and whistleblowers while building what it describes as the world's largest public library of previously secret information, encompassing materials from governments, corporations, and other entities. The organization's ideological foundation emphasizes radical transparency as an intrinsic value, independent of partisan agendas, with co-founder Emma Best stating that "the truth is its own goal." This principle drives DDoSecrets to prioritize revelation over selective endorsement, releasing datasets that expose potential abuses across ideological spectrums, such as law enforcement operations, corporate surveillance, and political initiatives, without apparent favoritism toward any political leaning. Ethical protocols focus on harm reduction and source integrity, though the willingness to disseminate raw hacked materials has drawn scrutiny for potentially amplifying privacy violations alongside public benefits. Team members, including journalists, activists, and cyber specialists—such as Best, a prolific FOIA requester, and others with backgrounds in anarchy or security engineering—reflect a coalition bound by commitment to informational freedom rather than a unified political doctrine. DDoSecrets maintains separation from groups like Anonymous despite shared goals and occasional data receipts, collaborating instead with journalistic bodies for verified analyses while upholding an apolitical stance in data handling.

Structure, Funding, and Leadership

Distributed Denial of Secrets (DDoSecrets) operates as a 501(c)(3) non-profit transparency collective in the United States, functioning as a decentralized group of data activists dedicated to archiving, publishing, and analyzing leaked and hacked datasets in the public interest. Unlike hierarchical organizations, it emphasizes collective decision-making and source protection, with internal protocols ensuring that even members do not share identifying details about submissions to maintain anonymity and security. This structure allows a small core team to handle operations while leveraging informal networks built over years in transparency and hacking communities, avoiding formal memberships but relying on trusted collaborators for verification and distribution. Leadership centers on Emma Best, a journalist and transparency advocate who co-founded the group in 2018 and serves as its primary spokesperson and operational driver. Best, known for prior work with WikiLeaks and Freedom of Information Act advocacy, coordinates publications and public statements, often emphasizing the neutrality of data regardless of source origins. The collective includes key advisors and contributors such as Maggie Mayhem, an activist focused on sex worker rights; Glenn Sorrentino, executive director of a design firm; Micah Lee, a security engineer and journalist; Milo Z. Trujillo, a systems scientist; and Delfin Mocache Massoko, founder of an Equatoguinean news outlet, who provide expertise in areas like security, analysis, and international sourcing. No formal executive board is publicly detailed beyond these roles, reflecting the group's emphasis on distributed responsibilities over centralized authority. Funding is sustained primarily through public donations, with the organization maintaining financial transparency via platforms like Open Collective and Donorbox. As of the latest available data, DDoSecrets has raised over $52,000 in total contributions, disbursed approximately $39,000, and holds a balance of about $13,000, supporting an estimated annual budget of roughly $14,000 for hosting, legal, and operational costs. Revenue streams include tiered memberships—such as $30 monthly from non-profits and academics, or $500 from commercial entities—alongside one-time and recurring custom donations from individuals and organizations, enabling low-overhead operations without reliance on grants or corporate sponsorships that could compromise independence. This model aligns with the collective's commitment to avoiding influences that might bias data selection or publication.

Operational Methods

Data Acquisition and Sourcing

Distributed Denial of Secrets acquires data primarily through anonymous submissions from leakers, hacktivists, whistleblowers, and private dataset collectors who provide hacked or leaked materials. The organization does not conduct hacks itself but serves as a recipient and publisher of externally obtained datasets, focusing on those deemed to advance public interest transparency. Submissions are encouraged from any party, with initial contact established via secure channels to protect source anonymity, including PGP-encrypted email to [email protected] (using key 143C 786C 8DF4 2BFF 381A 977C F9D1 D3D9 4179 75DC), Signal at @Disclosure.01, or a Tor-based GlobaLeaks platform accessible via onion address r4t6s3vzob6eidp7wg2c3smjitzusvdx2tsrt4sajwznch3dpcsvgtyd.onion. Post-contact, communications may shift to Cwtch, a metadata-resistant protocol, while sources are advised to adhere to operational security practices such as avoiding logs, retaining no copies of data, and disclosing any ongoing breaches only after completion to mitigate legal risks. Upon receipt, DDoSecrets reviews submissions for two core criteria: demonstrable public interest and verifiability of the data's authenticity and origin. Data must represent previously non-public information with potential societal value, such as exposures of corruption or security vulnerabilities, rather than routine or already accessible materials. The collective evaluates datasets internally, often collaborating with security experts and transparency advocates to confirm integrity without compromising sources, who may be credited only if explicitly authorized and safe. Examples include the 2020 BlueLeaks trove, sourced from a hack of Texas-based IT firm Netsential by Anonymous affiliates, comprising 269 gigabytes of U.S. law enforcement records. This sourcing model emphasizes protection of submitters within the organization while enabling broad dissemination, positioning DDoSecrets as an archiver of leaks from diverse actors including ransomware victims and geopolitical hacktivists.

Verification and Ethical Protocols

Distributed Denial of Secrets verifies the authenticity and integrity of leaked data through a combination of internal analyses, cross-referencing with external corroborating sources, and technical checks such as file hashes and metadata examination before archiving or publishing. For instance, in releasing hacked Russian government documents in 2019, the group applied multiple verification methods to affirm the data's validity, stating that "much of it has been corroborated by open sources." Similarly, for a 2025 breach of a communications app used by political figures, DDoSecrets confirmed the data's authenticity via independent assessments prior to distribution. These steps aim to ensure the material is not fabricated or altered, though the group does not publicly detail proprietary tools or exhaustive methodologies, prioritizing operational security. Ethically, DDoSecrets positions itself as a non-profit transparency collective that publishes data in the public interest, explicitly avoiding direct involvement in hacking while facilitating the dissemination of leaks obtained from third parties to "deny secrets" to powerful entities. The organization employs harm reduction practices, including scans for personally identifiable information (PII) and selective redaction to mitigate risks to non-newsworthy individuals, as outlined in their workflow of checking files for sensitive details before packaging releases. Efforts to standardize PII redaction are ongoing, with open-source initiatives on GitHub attempting to codify protocols, though implementation remains inconsistent across leaks. In cases like the 2020 Illinois Attorney General data release, redaction was applied as a deliberate harm reduction measure. The group's protocols have drawn criticism for potentially exposing vulnerable parties, as seen in the 2020 BlueLeaks publication of over 200 U.S. police departments' records, which included personal data and prompted legal threats from authorities alleging privacy violations. DDoSecrets counters such concerns by arguing that the public value of institutional transparency—such as revealing law enforcement practices or corporate malfeasance—outweighs individual risks when leaks target systemic power structures, a stance echoed by co-founder Emma Best in defenses of publishing ransomware victim data containing broader societal insights. Unlike more cautious outlets, DDoSecrets rarely withholds material on ethical grounds alone, favoring broad access via torrents and mirrors to decentralize distribution and evade censorship, which aligns with its ideological commitment to maximal disclosure but has fueled debates over journalistic responsibility in handling unredacted dumps.

Distribution and Technical Mechanisms

Distributed Denial of Secrets primarily distributes leaked datasets through torrent files to ensure decentralization and resilience against takedowns or seizures of central servers. This method allows peer-to-peer sharing, reducing reliance on any single hosting provider and enabling widespread availability even if the organization's primary website faces disruptions. For instance, all published documents are made accessible via torrents hosted on their public data server, which explicitly recommends this approach over direct HTTP downloads for speed and redundancy. The organization maintains a dedicated data portal at data.ddosecrets.com for accessing torrents and direct downloads of public releases, categorizing files by leak name such as "#29 Leaks" or specific datasets like Epik. Large-scale leaks, often comprising terabytes of data, are formatted for torrent compatibility to handle volumes incompatible with standard web downloads or common torrent clients. Announcements of new publications appear as articles on ddosecrets.com, providing metadata, context, and torrent links without hosting the full datasets centrally. To facilitate search and analysis, DDoSecrets employs specialized indexing tools. In 2020, following the "#29 Leaks" release, it launched Hunter, a public instance of the open-source Aleph search platform for querying documents across multiple leaks. More recently, on December 3, 2024, the organization introduced the Library of Leaks, a upgraded public search engine indexing millions of documents from dozens of datasets, with ongoing daily additions. This system supports broad accessibility while separating public content from reserved materials, the latter restricted to verified journalists and researchers via a tiered "library card" subscription requiring multi-factor authentication with physical devices like YubiKeys. Technical safeguards emphasize source anonymity and data integrity. DDoSecrets contributes to and utilizes open-source tools such as OnionShare for secure, Tor-based file sharing during acquisition and initial handling, aligning with its focus on protecting leakers. Hosting for the website and data services has relied on offshore providers like Flokinet to mitigate censorship risks, though torrents distribute the load across global peers. No central database stores all raw data; instead, verified hashes and metadata ensure authenticity in downloads.

Key Publications and Leaks

Domestic Security and Law Enforcement Exposures

In June 2020, DDoSecrets published BlueLeaks, a collection of 269 gigabytes of internal data from over 200 U.S. law enforcement agencies, fusion centers, and related entities, originally obtained through hacks attributed to the collective Anonymous. The materials included emails, incident reports, audio and video files, training documents, and intelligence bulletins, spanning agencies such as the San Francisco Regional Computer Forensics Laboratory and various state fusion centers involved in domestic threat monitoring. These exposures revealed operational details on police responses to protests, surveillance of activist groups, and inter-agency intelligence sharing protocols, with the National Fusion Center Association confirming the data's authenticity to independent security researchers. DDoSecrets has also released LexipolLeaks, comprising policy manuals and subscriber data from Lexipol, a private firm founded by former law enforcement officers that drafts standardized policies for thousands of U.S. police departments. The leaked documents outlined procedures for use of force, crowd control, and data retention, highlighting the privatization of policy-making in American policing and potential inconsistencies across adopting agencies. This release, supported by the transparency group Lucy Parsons Labs, exposed how corporate templates influence local law enforcement practices without public oversight. In November 2021, DDoSecrets disseminated 1.8 terabytes of police helicopter surveillance footage, primarily from operations in major U.S. cities, including real-time video feeds, flight logs, and metadata on aerial monitoring activities. The data illustrated the scope of airborne law enforcement surveillance, such as tracking vehicles and individuals during routine patrols and events, raising questions about privacy in domestic aerial operations conducted by municipal police departments. Additionally, DDoSecrets has archived older hacks targeting Arizona and Texas law enforcement systems by Anonymous-affiliated actors like LulzSec and AntiSec, which included databases of arrests, warrants, and internal communications, though these predate DDoSecrets' primary publishing era. These publications collectively underscore DDoSecrets' focus on disseminating materials that detail the mechanics of domestic security apparatus, from tactical responses to surveillance infrastructure.

Corporate and Financial Data Releases

Distributed Denial of Secrets has published multiple datasets encompassing corporate registries, donor records, accounting firm documents, and communications from financial service providers, often sourced from hacks targeting entities involved in offshore incorporation, fundraising platforms, and business management. These releases typically include emails, contracts, ownership details, and transaction-related files, with DDoSecrets verifying data authenticity prior to distribution via torrents and mirrors to ensure accessibility. The organization withholds personally identifiable information in some cases to mitigate risks, while emphasizing public interest in exposing potential fraud facilitation or opaque financial structures. One prominent release, "29 Leaks," comprises millions of emails, phone calls, and faxes from The London Office—a UK-based company formation agent formerly known as Formations House—and affiliated entities, spanning activities from 2003 to 2018. The data reveals services used to establish shell companies, including those linked to fraud and money laundering schemes, with records of client incorporations and operational communications. In the GiveSendGo leaks, published in January 2024, DDoSecrets released donor information for all campaigns on the platform, a Christian crowdfunding site frequently utilized by conservative and right-leaning groups for political and personal fundraising. This includes contribution details and metadata from thousands of campaigns; a follow-up "GiveSendGo 2.0" exposed over 1,000 files containing uploaded identification documents like driver's licenses and passports, inadvertently made public by users. Corporate registry data features in releases such as the Bahamas Registry, covering over 1 million documents up to late 2019, listing company names, directors, shareholders, and incorporation details for entities registered in the offshore jurisdiction. Similarly, Myanmar Financials provides hundreds of thousands of records on corporate ownership from government-linked databases, detailing beneficial owners and company structures. Accounting and tax-related leaks include files from Kallias and Associates, a Cyprus firm offering business management services, which contain client financial records and were cross-referenced with International Consortium of Investigative Journalists reports on offshore networks. In 2021, DDoSecrets aggregated and published terabytes of ransomware-extorted data from corporate victims, including stolen financial documents, contracts, and proprietary information from affected companies across sectors like manufacturing and healthcare, framing the collection as a counter to extortion demands.

Political and Government Document Dumps

DDoSecrets published the Trump Transition leak on January 23, 2024, comprising dozens of documents from the incoming Trump administration's transition team, including background reports and opposition research dossiers on prospective cabinet appointees and officials such as Wilbur Ross and Ray Washburne. These materials detailed potential vulnerabilities, past associations, and political alignments of candidates for roles in the executive branch. On June 17, 2025, the group released a redacted dataset containing applications submitted to Project 2025, an initiative by the Heritage Foundation involving policy blueprints and personnel recruitment for overhauling federal agencies in anticipation of a Republican presidency. The files exposed applicant resumes, cover letters, and preferences for government positions across departments, highlighting interest from individuals aligned with efforts to restructure administrative functions. In another release, DDoSecrets made available approximately 1,800 files attributed to former British Prime Minister Boris Johnson, including emails, diary entries, and miscellaneous records shedding light on his personal interests, decision-making processes, and interactions during his tenure. These documents, drawn from hacked sources, provided insights into Johnson's private correspondence and activities beyond official channels. DDoSecrets also archives U.S. government intelligence directives, such as the CIA's 2012 tasking orders—classified Secret/No Foreign Dissemination—for surveillance on French presidential candidates, including President Nicolas Sarkozy and Socialist Party figures, to assess their election strategies and foreign policy intentions. Originally disseminated via WikiLeaks in February 2017, the seven-page cable outlined intelligence collection priorities ahead of the vote.

International and Geopolitical Leaks

Distributed Denial of Secrets has published numerous datasets exposing operations of foreign governments and entities involved in geopolitical conflicts, particularly those related to state surveillance, military actions, and diplomatic maneuvers. These releases often stem from hacks attributed to pro-Ukraine or anti-authoritarian actors, highlighting tensions in regions like Eastern Europe and the Middle East. Verification processes by DDoSecrets include cross-checking data integrity and contextual analysis before public dissemination, though the group emphasizes that raw data may contain unverified claims. In response to Russia's 2022 invasion of Ukraine, DDoSecrets hosted leaks targeting Russian state institutions, including the "Russian Soldier Leak" released in 2022, which comprised personal data on approximately 120,000 Russian military personnel allegedly deployed in Ukraine, such as names, dates of birth, addresses, and unit affiliations, sourced from the hacking group Pravda. This dataset aimed to document Russian troop involvement and has been used by journalists to track mobilization efforts. Additional releases included files from Roskomnadzor, Russia's communications regulator, such as the "RussianCensorFiles" detailing internal monitoring of social media for content blocking, revealing mechanisms of domestic information control amid the war. The group also published over 13,500 files from Sberbank of Russia's translation bureau in January 2024, containing analyses of political and military developments, including assessments of international sanctions and conflict dynamics. These publications contributed to broader efforts by hacktivists to undermine Russian operations, with DDoSecrets facilitating distribution while noting potential risks of doxxing. Leaks concerning Israel, often linked to the Israel-Hamas conflict, form a significant portion of DDoSecrets' international releases. In August 2025, the group published over 100,000 emails from former Israeli Prime Minister Ehud Barak spanning 2007–2016, covering his tenure as Defense Minister and interactions with global figures on security matters. Complementary datasets included nearly 50,000 emails from Gabi Ashkenazi (2004–2016), former Chief of General Staff, and over 25,000 from Benny Gantz (2007–2017), both revealing internal discussions on military strategy and political alliances. Earlier in 2024, releases from the Israel Ministry of Justice (800,000 emails and 200,000 documents) and Ministry of Defense (nearly 200,000 files) exposed communications on legal and defense policies, while "Gaza Volume 05" compiled geolocated evidence of alleged war crimes from public sources like Discord and Telegram. Tens of thousands of emails from Israeli Ambassador Ron Prosor (2005–2016), released in October 2025, detailed diplomatic engagements. These datasets, primarily from groups like Anonymous For Justice and Handala, have fueled debates on Israeli foreign policy transparency, though critics argue selective sourcing may amplify partisan narratives. European diplomatic exposures include the "Boris Files" from October 2025, comprising about 1,800 documents such as emails and diary entries from former UK Prime Minister Boris Johnson, shedding light on post-office business dealings and prior governmental interests with international implications, including ties to global consulting. In a January 2024 release, over 30,000 emails from Ecuador's Moscow embassy (2018–2022) revealed bilateral discussions on espionage concerns, such as U.S. NSA activities and extradition issues involving Julian Assange. Other geopolitical datasets encompass surveillance tech sales by Geedge Networks to regimes in Myanmar, Ethiopia, Kazakhstan, and Pakistan, documented in October 2025 files exposing censorship tools amid regional authoritarianism. These leaks underscore DDoSecrets' focus on cross-border power structures, though access restrictions by platforms like X and Reddit have limited their dissemination in certain jurisdictions.

Responses from Stakeholders

Government and Law Enforcement Reactions

The publication of BlueLeaks in June 2020, a 269-gigabyte trove of data from over 200 U.S. law enforcement agencies spanning 24 years, elicited acknowledgments of data authenticity and vulnerability concerns from agencies rather than pursuits against Distributed Denial of Secrets (DDoSecrets). The National Fusion Center Association confirmed the leaked materials' validity, prompting discussions on systemic cybersecurity gaps in fusion centers and police networks. In specific jurisdictions, such as Maine, the inclusion of 5 gigabytes from the Maine Information Analysis Center (MIAC) in BlueLeaks generated controversy, leading to internal procedural reviews and debates over data handling practices. Emma Best, DDoSecrets' founder, testified before the Maine Legislature in 2021 that the leak's exposure catalyzed these audits, framing them as beneficial for accountability rather than grounds for restrictive legislation. Broader federal responses have focused on the originating hacks rather than DDoSecrets' role in verification and distribution, with no public records of investigations, arrests, or sanctions targeting the organization itself as of 2025. Congressional Research Service analyses of exposed law enforcement tools post-leak emphasized operational risks without implicating publishers like DDoSecrets in illegality. This contrasts with actions against hackers, as seen in Department of Justice prosecutions under the Computer Fraud and Abuse Act for the underlying breaches.

Platform Censorship and Tech Industry Pushback

In June 2020, Twitter permanently suspended the @DDoSecrets account following the group's distribution of the BlueLeaks dataset, a 269 GB collection of internal U.S. police documents obtained via a breach at Netsential, a Houston-based web development firm contracted by law enforcement agencies. The platform cited violations of its policies against distributing hacked materials, though DDoSecrets maintained the data served public interest by exposing law enforcement practices. As a result, Twitter extended restrictions to block users from posting any URLs linking to DDoSecrets' site, effectively limiting the group's visibility on the platform. By September 2023, X (formerly Twitter) continued to enforce link-blocking measures against DDoSecrets, preventing users from sharing the site's content, a policy that persisted amid the group's publication of leaks deemed sensitive by various stakeholders. Reddit similarly implemented automated filters to quarantine or remove posts containing DDoSecrets links, classifying them as potential violations of rules on doxxing or hacked content, which hindered dissemination of datasets like those related to geopolitical hacks. These actions reflect broader tech platform policies prioritizing content moderation over unrestricted data sharing, often in response to pressures from governments or affected entities, though DDoSecrets has argued such censorship undermines journalistic transparency without legal due process. Tech industry pushback has also manifested in service terminations and hosting challenges; for instance, following high-profile releases, DDoSecrets encountered difficulties with cloud providers and domain registrars, prompting reliance on decentralized mirrors and torrent distribution to evade single points of failure. In cases like the 2023 Appin leak alleging global hacking operations by an Indian firm, initial censorship attempts on mirrors by unnamed tech intermediaries were countered by advocacy from groups such as the Electronic Frontier Foundation, highlighting tensions between proprietary platform controls and open-access data principles. Despite these barriers, DDoSecrets has sustained operations through volunteer networks and alternative hosting, underscoring the decentralized ethos in its name as a bulwark against centralized tech gatekeeping.

Media and Public Discourse

Distributed Denial of Secrets (DDoSecrets) has received media coverage primarily in connection with its publication of high-profile leaks, often framing the organization as a conduit for hacktivist data amid debates over transparency versus security. Outlets have highlighted its role in releasing the Oath Keepers membership database in September 2021, which journalists used to expose alleged ties between the group's members and U.S. law enforcement agencies across multiple departments. Similarly, in March 2022, DDoSecrets published files hacked by Anonymous from Russia's state censorship agency, Roskomnadzor, which media reports described as an effort to disrupt Kremlin information controls during the Ukraine invasion. Coverage in sources like the Columbia Journalism Review has portrayed DDoSecrets as a response to perceived media self-censorship, with co-founder Emma Best citing Reuters' removal of a story on alleged Saudi involvement in Jamal Khashoggi's murder as a catalyst for the group's formation in 2018. Public discourse has frequently revolved around the ethics of journalistic use of hacked materials distributed by DDoSecrets, with commentators questioning the balance between public interest and potential illegality. An analysis in The Click argued that while DDoSecrets provides raw data for verification, journalists risk complicity in unauthorized access by engaging with it, emphasizing the need for independent sourcing to mitigate biases in leak origins. Ideological tensions surfaced in responses to the 2021 GabLeaks dataset, where DDoSecrets shared over 4 million user records from the platform; left-leaning outlets like The Intercept declined to analyze it, prompting critic Glenn Greenwald to accuse them of partisan selectivity favoring establishment narratives over transparency. Conservative media, in turn, amplified concerns over privacy invasions in such releases, contrasting them with less scrutiny for leaks targeting right-leaning entities. Platform moderation has fueled broader discussions on free speech limits, as Twitter suspended DDoSecrets' account in June 2020 for posting FBI surveillance coordination documents related to 2020 protests, a ban that continued into late 2022 despite ownership changes under Elon Musk. In congressional testimony, such as a 2022 House hearing on extremism, DDoSecrets' Oath Keepers release was referenced as evidence in discussions of domestic threats, underscoring its influence on policy debates while inviting scrutiny over data provenance. Recent discourse, including a October 2025 War on the Rocks article, has noted DDoSecrets as a preferred outlet for politically motivated leakers, highlighting risks of selective dissemination that may amplify certain narratives over others. Overall, media portrayals often reflect source affiliations, with mainstream outlets emphasizing accountability for powerful actors but downplaying leaks challenging progressive priorities, as evidenced by uneven enthusiasm for datasets like GabLeaks versus those implicating militias.

Controversies and Criticisms

The U.S. Department of Homeland Security (DHS) classified Distributed Denial of Secrets (DDoSecrets) as a "criminal hacker group" in an August 2020 intelligence bulletin, following the group's publication of the BlueLeaks dataset containing internal law enforcement records from over 200 U.S. agencies. This assessment stemmed from concerns over the exposure of sensitive operational details, including personal information on law enforcement personnel, but did not result in any announced criminal charges or civil actions against the organization. As of October 2025, DDoSecrets has faced no publicly documented lawsuits, indictments, or prosecutions in the United States or elsewhere for its core activities of archiving and disseminating leaked materials. Potential illegality arises primarily from the sourcing of DDoSecrets' datasets, which frequently originate from unauthorized cyber intrusions rather than voluntary whistleblowing. Under the U.S. Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, liability could theoretically attach to parties that "knowingly cause the transmission of a program, information, code, or command" leading to unauthorized access, though DDoSecrets explicitly avoids direct involvement in hacks and positions itself as a passive publisher of already-public dumps. Legal scholars note that while the CFAA targets initial unauthorized access, downstream publication by non-hackers has not been successfully prosecuted in U.S. courts, drawing partial analogy to First Amendment protections affirmed in New York Times Co. v. United States (1971), which shielded the press from prior restraint on publishing classified leaks. However, for non-classified private data—such as corporate records or personal identifiers—civil claims under trade secret laws (e.g., Defend Trade Secrets Act) or privacy statutes remain a risk, particularly if publications enable identity theft or competitive harm, though no such suits have targeted DDoSecrets. Internationally, DDoSecrets' operations have prompted blocking orders rather than litigation; for instance, Russian authorities restricted access to the site in 2022 amid publications of state-linked data, citing national security violations under local cybercrime statutes. Similarly, Indonesia imposed blocks on DDoSecrets content in 2023, framing it as illegal dissemination of hacked materials under the Electronic Information and Transactions Law. These measures highlight jurisdictional tensions, as U.S.-based servers and nonprofit status offer limited insulation from foreign enforcement, potentially exposing collaborators or mirrors to extradition risks in adversarial nations. Critics, including cybersecurity analysts, argue that even absent direct CFAA applicability, republishing raw hacked archives without redaction could indirectly facilitate crimes like doxxing or extortion, blurring lines between journalism and complicity.

Security Risks and Unintended Harms

The release of the BlueLeaks dataset by Distributed Denial of Secrets on June 19, 2020, comprising 269 gigabytes of data from over 200 U.S. police departments, fusion centers, and related agencies, exposed personal identifying information for approximately 700,000 law enforcement officers, including emails, home addresses, and other details that could facilitate doxxing or targeted harassment. This included over 16 million rows of records with sensitive operational details, such as raid plans and informant identities, which security analysts noted could alert criminal suspects, disrupt active investigations, and heighten risks to officer safety amid heightened tensions following the George Floyd protests. Beyond BlueLeaks, DDoSecrets' publication of unredacted datasets from other breaches has amplified privacy violations for incidental victims, such as ransomware targets whose stolen data—already compromised on dark web forums—was further disseminated publicly, exposing corporate secrets, employee records, and financial details to broader exploitation without mitigation. In the February 2021 Gab platform leak, the group's hosting of 70 gigabytes of user data, including unencrypted private messages and passwords for over 15 million accounts, enabled potential unauthorized access to personal communications, raising risks of identity theft and stalking for users beyond the platform's primary far-right demographic. These actions have unintended downstream effects, as the permanent online availability of voluminous, minimally vetted leaks allows malicious actors to mine for credentials, geolocation data, or vulnerabilities, facilitating phishing campaigns, extortion, or physical threats that extend harms to non-targeted individuals like crime victims or bystanders whose details appear collaterally. Cybersecurity experts have emphasized that such broad releases, lacking comprehensive redaction, undermine data protection norms and can erode trust in leak repositories, indirectly encouraging fragmented, uncontrolled redistribution on less secure channels.

Ideological Biases and Selective Transparency

Distributed Denial of Secrets (DDoSecrets) asserts a commitment to publishing leaked and hacked materials solely based on public interest criteria, without ideological favoritism or encouragement of unlawful data acquisition. The organization vets submissions for relevance, potential harm such as doxxing, and broader societal value, rejecting or redacting portions deemed too sensitive, as exemplified by its handling of the 70 GB GabLeaks dataset in February 2021, where full public release was withheld to protect private user information. This vetting process inherently introduces selectivity, as DDoSecrets decides which datasets to prioritize for dissemination to journalists, researchers, and the public. A review of DDoSecrets' prominent releases indicates a disproportionate emphasis on data from entities associated with conservative or right-leaning ideologies. For instance, in September 2021, the group published membership records and communications from the Oath Keepers, a militia group linked to right-wing extremism, enabling analyses of participants in events like the January 6, 2021, U.S. Capitol riot. Similarly, in June 2025, DDoSecrets released a redacted database of over 13,000 applicants to the Heritage Foundation's Project 2025 initiative, framing it as part of an "anti-democratic effort" to reshape U.S. government structures under a potential conservative administration. These publications align with narratives critical of right-wing movements, amplified by partnering media outlets. In contrast, DDoSecrets' high-profile anti-establishment releases, such as the 269 GB BlueLeaks trove of U.S. law enforcement documents in June 2020—timed amid nationwide protests following George Floyd's death—facilitated scrutiny of police surveillance and operations, resonating with progressive demands for reform. While the group has also disseminated materials like Russian government documents in 2019 and paramilitary chat logs in 2025, the absence of equivalent emphasis on leaks targeting left-leaning organizations or figures has prompted observers to infer implicit biases in selection. Co-founder Emma Best's background in investigative journalism, which has frequently targeted far-right networks, may contribute to this perceived skew, though DDoSecrets maintains its decisions stem from objective public benefit assessments rather than partisanship. Such selectivity risks undermining claims of comprehensive transparency, as the group's editorial judgments shape which secrets enter public discourse.

Broader Impacts

Claims of Public Benefit and Transparency Gains

DDoSecrets positions itself as a transparency collective dedicated to archiving and disseminating hacked and leaked datasets deemed to serve the public interest, arguing that such releases counteract institutional secrecy and empower independent scrutiny of powerful entities. The organization, structured as a U.S. 501(c)(3) non-profit, claims its operations facilitate the "free transmission of data" to researchers, journalists, and civil society, thereby fostering accountability in areas like government surveillance, corporate misconduct, and geopolitical conflicts where official disclosures are limited or delayed. Proponents, including DDoSecrets affiliates, assert that publications such as BlueLeaks—comprising 269 GB of U.S. law enforcement data from over 200 agencies released in June 2020—have advanced public understanding of police practices, including internal communications on protests and surveillance tactics, which they argue would otherwise remain shielded from oversight. Similarly, the group's hosting of 70 GB from the 2021 Gab platform breach, including private messages and user data, is cited as enabling academic and journalistic analysis of online extremism and platform moderation failures, with access restricted to verified researchers to mitigate misuse while promoting evidence-based discourse. In the context of international tensions, DDoSecrets claims benefits from disseminating Russian government and corporate leaks during the 2022 Ukraine invasion, such as data from state media and oligarch-linked firms, which supporters say exposed corruption and military logistics otherwise obscured by state control, aiding global awareness and policy responses. The organization further maintains that compiling ransomware victim datasets, as in their 2021 collections, highlights systemic vulnerabilities in critical infrastructure without endorsing the initial hacks, positioning this as a deterrent against opacity in cybersecurity practices. DDoSecrets and aligned commentators contend these efforts reveal the shortcomings of sanctioned transparency mechanisms, such as authorized leaks or regulatory filings, by providing raw, unfiltered data that uncovers causal links between hidden actions and public harms— for instance, in policing or foreign policy—ultimately pressuring reforms through decentralized verification rather than relying on potentially biased institutional gatekeepers. The group expresses a long-term vision of obsolescence through broader societal shifts toward openness, implying their interventions catalyze incremental gains in accountability absent from status quo channels.

Empirical Consequences and Causal Effects

The release of BlueLeaks on June 19, 2020, comprising 269 gigabytes of data from over 200 U.S. law enforcement agencies, fusion centers, and related entities, empirically demonstrated both transparency gains and privacy risks. The archive revealed detailed surveillance operations targeting Black Lives Matter protests, including monitoring of social media activity, protest participant lists, and intelligence sharing across agencies in regions like Northern California and Maine. This exposure fueled contemporaneous reporting on police tactics amid the George Floyd protests, contributing to public scrutiny of fusion center activities and predictive policing tools. However, the data also contained personal identifiers for approximately 700,000 officers, alongside records of acquitted individuals and sensitive operational details, correlating with heightened doxxing threats and criticisms of endangering non-combatants. Subsequent operational fallout included platform deplatforming, such as Twitter's permanent suspension of DDoSecrets' account on June 23, 2020, for distributing hacked materials, and the seizure of a German-hosted server by authorities on July 7, 2020, disrupting access to the BlueLeaks repository. These actions illustrate causal effects on the organization's dissemination capacity, prompting reliance on decentralized mirrors and Tor-hidden services. Broader data dumps, like those from ransomware victims published in January 2021, have supported victim recovery efforts by exposing decryption keys and attacker infrastructures, though ethical debates persist over redistributing compromised corporate secrets without victim consent. In geopolitical contexts, DDoSecrets' curation of hacked Russian datasets since 2019 has empirically aided cybersecurity researchers in attributing state-sponsored operations, as evidenced by analyses mapping intrusion tools and actor networks from leaked internal documents. One verifiable policy-linked outcome involved a leak of Myanmar military financial data, which triggered public allegations of elite profiteering and subsequent regulatory adjustments that reduced generals' revenue streams by millions in 2020–2021. Despite these instances, comprehensive studies show limited causal evidence of systemic reforms; leaks primarily amplify episodic awareness rather than inducing measurable behavioral shifts in targeted institutions, with privacy erosions often outweighing unproven long-term benefits in risk assessments.

Comparisons to Similar Organizations

Distributed Denial of Secrets (DDoSecrets) operates in a landscape of transparency-focused entities, most closely resembling WikiLeaks in its core function of archiving and disseminating leaked materials for public scrutiny. Established in 2018 as a 501(c)(3) nonprofit, DDoSecrets emphasizes non-selective publication of verified data dumps, including those from state, corporate, and law enforcement sources, without the editorial curation that characterized WikiLeaks' approach under Julian Assange. Unlike WikiLeaks, which pioneered secure anonymous submissions via a Tor-hidden service starting in 2006 and prioritized leaks with global geopolitical impact—such as the 2010 Collateral Murder video—DDoSecrets forgoes a public dropbox, instead vetting submissions through direct channels to mitigate operational risks while claiming broader inclusivity. This structural difference arose partly from WikiLeaks' legal entanglements, including Assange's 2019 arrest, which diminished its activity; DDoSecrets has since hosted WikiLeaks' full archives in a searchable format as of July 2024, ensuring continuity of access to over 10 million documents. DDoSecrets also intersects with hacktivist collectives like Anonymous, though it functions distinctly as a publisher rather than a perpetrator of intrusions. Anonymous, a decentralized movement emerging around 2008, conducts direct cyber operations such as distributed denial-of-service attacks and data exfiltration, often in response to perceived injustices like the 2020 George Floyd protests, from which DDoSecrets sourced the 269-gigabyte BlueLeaks trove of U.S. police records published in June 2020. DDoSecrets has explicitly stated it is "entirely separate" from Anonymous despite aligning on anti-secrecy goals and receiving materials from its affiliates, including Russian government data hacks amid the 2022 Ukraine invasion; this contrasts with Anonymous' fluid, leaderless actions that prioritize disruption over systematic archiving. Where Anonymous' outputs can be raw and unverified, DDoSecrets applies verification protocols before release, publishing over 100 datasets by 2023, including ransomware victim files to expose corporate vulnerabilities. In comparison to journalistic consortia like the International Consortium of Investigative Journalists (ICIJ), which coordinated the 2016 Panama Papers release involving 11.5 million documents from verified leaks, DDoSecrets lacks formal media partnerships and editorial redactions, opting for full-data dissemination to avoid perceived censorship— a stance that has drawn criticism for potential harms akin to those debated in WikiLeaks' unredacted Afghan War logs in 2010. These distinctions highlight DDoSecrets' positioning as a more operationally decentralized and less institutionally embedded alternative, prioritizing archival persistence over narrative framing.

References

  1. [1]
    Distributed Denial of Secrets: Home
    A 501(c)(3) dedicated to archiving and publishing hacked and leaked data.All CategoriesDDoSecrets Public Data ServerAndrew Tate's The Real WorldAll Recently Published ArticlesAbout Us
  2. [2]
    Huge Trove of Leaked Russian Documents Is Published by ...
    Jan 25, 2019 · Best said Distributed Denial of Secrets is operated by fewer than 20 people who live in multiple countries, most preferring to remain anonymous.Missing: controversies | Show results with:controversies
  3. [3]
    List of material published by Distributed Denial of Secrets - Wikipedia
    Since its formation in 2018, non-profit whistleblower website Distributed Denial of Secrets (abbreviated DDoSecrets) has published dozens of terabytes of ...
  4. [4]
    Anonymous Stole and Leaked a Megatrove of Police Documents
    Jun 22, 2020 · A leak-focused activist group known as Distributed Denial of Secrets published a 269-gigabyte collection of police data that includes emails, audio, video, and ...
  5. [5]
    DDoSecrets Archives - CyberScoop
    Environmental hacktivists publish 2 terabytes of mining company emails ... The group called Guacamaya posted files from public and private mining companies and ...
  6. [6]
    Anti-Secrecy Activists Publish a Trove of Ransomware Victims' Data
    Jan 6, 2021 · WikiLeaks successor DDoSecrets has amassed a controversial new collection of corporate secrets and is sharing them in the name of transparency.
  7. [7]
    Ethical concerns about privacy and transparency clash ... - LAist
    Dec 4, 2018 · Ethical concerns about privacy and transparency clash following launch of leak website 'Distributed Denial of Secrets'. We live in a world ...
  8. [8]
    WikiLeaks data to remain live thanks to Distributed Denial of Secrets
    Jul 16, 2024 · The leak-hosting site Distributed Denial of Secrets has announced that it will host all of WikiLeaks' content – and in a much easier-to-access format.
  9. [9]
    DDoSecrets publishes leaked Signal-clone messages​ | Cybernews
    May 20, 2025 · “To facilitate research, Distributed Denial of Secrets has extracted the text from the original heap dumps,” DDoSecrets said. The public library ...<|separator|>
  10. [10]
    Distributed Denial of Secrets (@ddosecrets) - Instagram
    1.8K+ followers · 35 following · 21 posts · @ddosecrets: “Distributed Denial of Secrets, a 501c3 transparency collective. We are not hacktivists.
  11. [11]
    About Us - Distributed Denial of Secrets
    Mocache Massoko is the founder and editor of Diario Rombe, publishing stories about corruption and money laundering in Equatorial Guinea since 2012.Missing: origins | Show results with:origins
  12. [12]
    Distributed Denial of Secrets is picking up where WikiLeaks left off
    Oct 21, 2021 · Founded in 2018 by journalist Emma Best and an anonymous partner known as The Architect, DDoSecrets has quietly been one of the most effective ...
  13. [13]
    DDoSecrets Is the New WikiLeaks - The New Republic
    Aug 18, 2021 · Distributed Denial of Secrets, or DDoSecrets, had been a thorn in ... launched DDoSecrets in December 2018 with someone known only by ...
  14. [14]
    A new group devoted to transparency is exposing secrets Wikileaks ...
    Feb 6, 2019 · Best's reputation as a national security journalist and dogged FOIA filer precedes her. Now, she is the public face of DDOS's otherwise ...
  15. [15]
    How a nonprofit group has become the biggest repository for hacked ...
    Jul 5, 2022 · EMMA BEST: We didn't want to be 2016-ed (ph). MCLAUGHLIN: That's Emma Best, the co-founder of Distributed Denial of Secrets. She means that the ...
  16. [16]
    A leak-hosting site looks to thaw the chill of censorship
    Jan 18, 2024 · For Emma Best, the co-founder of a leak-hosting site called Distributed Denial of Secrets, or DDoSecrets, seeing Reuters remove its story ...<|separator|>
  17. [17]
    Distributed Denial of Secrets - GuideStar Profile
    Distributes Denial of Secrets (DDoSecrets) is a transparency collective, enabling the free transmission of data in the public interest.<|separator|>
  18. [18]
    Distributed Denial of Secrets - Open Collective
    Are you a non-profit publisher or academic research lab? Do you need to enrol multiple Hunter users? Where is your office based? This is a sliding-.
  19. [19]
    An Embattled Group of Leakers Picks Up the WikiLeaks Mantle
    Jun 26, 2020 · A small group of activists known as Distributed Denial of Secrets, or DDoSecrets, has quietly but steadily released a stream of hacked and leaked documents.
  20. [20]
    DDoSecrets' mission is 'unchanged' in wake of 'BlueLeaks' Twitter ban
    Jun 24, 2020 · DDoSecrets supports the general goals of the Anonymous movement, and has received data from members, but is an “entirely separate” entity, co- ...Missing: ideology | Show results with:ideology
  21. [21]
    Submit - Distributed Denial of Secrets
    We are always open to accept data by any party. We take measures to protect the identity of our sources, even between members of the collective.
  22. [22]
    How DDoSecrets built the go-to home for Russian leaks
    Jul 26, 2022 · DDoSecrets gets most of its materials from private dataset collectors, leakers and hacktivists. It reviews the data and then decides whether it ...
  23. [23]
    'BlueLeaks' exposes sensitive files from hundreds of police ...
    Jun 23, 2020 · The collective has two criteria for publishing data: The data has to be of public interest, and it's got to be capable of being verified.
  24. [24]
    Working With Hackers: Where — and How — Journalists Should ...
    Nov 28, 2023 · Horne said that DDoSecrets seeks important data that is not otherwise publicly available, and that their team evaluates leaks in terms of “a ...Missing: criteria | Show results with:criteria
  25. [25]
    Transparency Activists Release Cache of Hacked Russian Documents
    Jan 29, 2019 · DDoSecrets also used a variety of methods to verify the data. “We strongly believe that all the information is valid and much of it has been ...
  26. [26]
    Exclusive: Hacker who breached communications app used by ...
    May 21, 2025 · ... Distributed Denial of Secrets, a U.S. nonprofit whose stated mission ... authenticity. Advertisement · Scroll to continue. Based on its ...
  27. [27]
    Far-Right Platform Gab Has Been Hacked—Including Private Data
    Feb 28, 2021 · According to DDoSecrets' Best, the hacker says that they pulled out Gab's data via a SQL injection vulnerability in the site—a common web bug in ...
  28. [28]
    What is Distributed Denial of Secrets? - Backdrifting
    Apr 10, 2022 · Distributed Denial of Secrets (DDoSecrets) is a transparency collective. We've seen some questions and confusion recently as to what that means, ...Missing: founding principles
  29. [29]
    Distributed Denial of Secrets - GitHub
    Distributed Denial of Secrets (DDoSecrets) is a transparency collective, aimed at enabling the free transmission of data in the public interest.Missing: submission | Show results with:submission
  30. [30]
    Illinois Attorney General - Distributed Denial of Secrets
    Distributed Denial of Secrets is archiving the data and making it ... redaction is a form of harm reduction. Request Access. Research. DoppelPaymer ...
  31. [31]
    Decades' worth of US police records leaked - ScienceDirect
    A group calling itself Distributed Denial of Secrets (DDoSecrets), and ... authenticity of the leaked data and said that it contained names, email ...
  32. [32]
    DDoSecrets Public Data Server - Distributed Denial of Secrets
    DDoSecrets Public Data Server. Please consider downloading via torrent. This is often faster than downloading over the web, and helps keep data available.Of /29 Leaks · Of /Andrew Tate's The Real... · Andrew Tate's War Room videosMissing: verification methods
  33. [33]
    Hosting Under Duress - Backdrifting
    Mar 26, 2021 · All the documents published by DDoSecrets are distributed by torrent, so there is no central server to seize or account to ban to halt ...<|separator|>
  34. [34]
    Epik - Distributed Denial of Secrets
    Due to its size, it's incompatible with most torrent clients and many users will have difficulty downloading the data. Contents. According to the hackers, the ...
  35. [35]
    29 Leaks - Distributed Denial of Secrets
    Upon publication of #29 Leaks, DDoSecrets launched its instance of Aleph called Hunter, which was open to the public.
  36. [36]
    Introducing the DDoSecrets library system
    Dec 3, 2024 · We are launching a new public search: the Library of Leaks. The tool already contains millions of documents from dozens of leaks. More data is added every day.
  37. [37]
    BlueLeaks - Distributed Denial of Secrets
    Blueleaks are 269 gigabytes of internal US law enforcement data obtained by the hacktivism collective Anonymous, released on June 19, 2020.
  38. [38]
    'Distributed Denial of Secrets' publishes 'BlueLeaks,' a trove of law ...
    Jun 22, 2020 · An anonymous hacktivist group says it's published a trove of sensitive law enforcement data that originated with hundreds of police departments.Missing: ideology | Show results with:ideology
  39. [39]
    Hackers Leaked 269 GB of U.S. Police and Fusion Centers Data ...
    Jun 22, 2020 · Hackers published a massive 269 GB of data allegedly stolen from more than 200 police departments, fusion centers, and other law enforcement ...Missing: details size
  40. [40]
    'BlueLeaks': data from over 200 police departments exposed in a ...
    Jun 22, 2020 · Some members of DDoSecrets, including Emma Best, have clarified some common misconceptions about their group made by Bahama's Attorney General's ...
  41. [41]
    LexipolLeaks - Distributed Denial of Secrets
    DDoSecrets thanks Lucy Parsons Labs for its support in publishing this release. Research. “Puppygirl hacker polycule” leaks over 8,500 privatized police files ...
  42. [42]
    1.8 TB of Police Helicopter Surveillance Footage Leaks Online
    Nov 5, 2021 · The transparency activist group Distributed Denial of Secrets, or DDoSecrets, posted a 1.8-terabyte trove of police helicopter footage to its website on Friday.
  43. [43]
    Articles of Type: Hack - Distributed Denial of Secrets
    Distributed Denial of Secrets is a 501(c)(3) non-profit. Support our mission! Contact. Follow us on BlueSky, Mastodon and Telegram. Complete ...Missing: incorporation nonprofit
  44. [44]
    Articles of Type: Corporate - Distributed Denial of Secrets
    Release contains documents dated between 2017 and 2020 from Constellis (a.k.a. Academi, Blackwater), the security contracting firm founded by Eric Prince.Missing: motivation | Show results with:motivation
  45. [45]
  46. [46]
  47. [47]
    Bahamas Registry - Distributed Denial of Secrets
    This copy of the Corporate Registry of the Bahamas contains data current until the end of 2019. The set of more than 1 million documents list company names, ...
  48. [48]
    Myanmar Financials - Distributed Denial of Secrets
    Hundreds of thousands of records relating to the corporate ownership and for companies in Myanmar from the offices of myco.dica.gov.mm and bo.dica.gov.mm.
  49. [49]
    Kallias and Associates - Distributed Denial of Secrets
    Kallias & Associates is a Cyprus-based firm that provides accounting, tax and business management services. According to the ICIJ, Kallias & Associates was ...
  50. [50]
    Trump Transition leak - Distributed Denial of Secrets
    Dozens of documents from the Trump administration transition, including backgrounds and opposition research on potential Trump appointees.Missing: political | Show results with:political
  51. [51]
    Project 2025 applicant database - Distributed Denial of Secrets
    Jun 17, 2025 · A redacted dataset of applicants of the Heritage Foundation's Project 2025, an anti-democratic effort to dismantle large portions of the administrative state.
  52. [52]
    Boris Files - Distributed Denial of Secrets
    Approximately 1800 files from Boris Johnson, including emails, diary entries, and other documents that shine a light on Johnson's interests and activities ...
  53. [53]
    CIA French Elections 2012 - Distributed Denial of Secrets
    Released 16 February 2017, CIA French Elections 2012 consists of United States Central Intelligence Agency Secret / No Foreign tasking orders to spy on the ...
  54. [54]
    WikiLeaks: CIA ordered spying on French 2012 election - AP News
    Feb 17, 2017 · A seven-page document made public by WikiLeaks purports to show that the US Central Intelligence Agency ordered its spies to gather information on the 2012 ...Missing: DDoSecrets | Show results with:DDoSecrets
  55. [55]
    RussianCensorFiles - Distributed Denial of Secrets
    Documents and correspondence from the internal network of the General Radio Frequency Center (GRFC) subdivision of Roskomnadzor. GRFC monitors social media ...
  56. [56]
    Russian soldier leak - Distributed Denial of Secrets
    Personal data of 120000 Russian soldiers allegedly fighting in Ukraine, leaked by Pravda. The data includes names, DOBs, addresses, unit affiliation and ...
  57. [57]
    DDoSecrets Group Helps Hackers Spread Russian Data - Bloomberg
    Apr 6, 2022 · The group vets the material it obtains prior to publication, but cautions that it was obtained amid a war and may have been altered or ...
  58. [58]
    Ehud Barak emails - Distributed Denial of Secrets
    Over 100000 emails and attachments from the former Prime Minister of Israel, Ehud Barak. The data ranges from 2007 to 2016, which includes the time that ...<|separator|>
  59. [59]
    Israel Ministry of Justice - Distributed Denial of Secrets
    Documents from the Israel Ministry of Justice released April 2024 by Anonymous For Justice. The dataset contains 800000 emails in HTML format, ...
  60. [60]
    Gaza, Volume 05 - Distributed Denial of Secrets
    An archive of war crimes evidence compiled by Israel Exposed including geolocation data and backups from Discord, Telegram, and Twitter. According to Israel ...
  61. [61]
    Tech Companies and Governments Are Censoring DDoSecrets
    Sep 12, 2023 · X and Reddit prevent users from sharing links to the journalist collective DDoSecrets. Russia and Indonesia are also blocking access.
  62. [62]
    [PDF] Cyber SecurityJuly 2020 - Texas Department of Public Safety
    Jul 21, 2020 · Reporter Brian Krebs, citing the organization National Fusion Center Association. (NFCA), confirmed the validity of the leaked data. DDOSecrets ...
  63. [63]
    [PDF] Statement of Emma Best on LD 1278 - Maine Legislature - Maine.gov
    Before I do, I ask that the Committee grant me a moment to explain my background and experience as a journalist and analyst. ... (DDoSecrets), a 501(c)3 committed ...
  64. [64]
    [PDF] MIAC SHADOW REPORT | Maine Beacon
    Apr 1, 2022 · A month later the controversy deepened with the publication of BlueLeaks, a 269-gigabyte hack of police data which included. 5 gigabytes of MIAC ...Missing: leaks | Show results with:leaks<|separator|>
  65. [65]
    [PDF] Exposed Data Highlights Law Enforcement Use of Selected ...
    Jul 10, 2019 · Later, a transparency collective, Distributed Denial of Secrets, posted some of the documents to the surface web as well. Reporters who ...<|separator|>
  66. [66]
    2 Defendants Charged in U.S. Courts as Part of Global Crackdown ...
    Dec 11, 2024 · The Justice Department today announced the court-authorized seizure of 27 internet domains associated with some of the world's leading DDoS-for-hire services.Missing: Secrets | Show results with:Secrets
  67. [67]
    Twitter bans DDoSecrets account over 'BlueLeaks' police data dump
    Jun 24, 2020 · A Twitter spokesperson has told ZDNet today that they've permanently suspended the @DDoSecrets Twitter account for violating its policy ...
  68. [68]
    DDoSecrets thrown off Twitter after distributing 269GB BlueLeaks ...
    Jun 24, 2020 · The activist group Distributed Denial of Secrets, perhaps better known by their shorter but clumsy moniker DDoSecrets, has been permanently banned from Twitter.
  69. [69]
    A Startup Allegedly 'Hacked the World.' Then Came the Censorship ...
    Feb 1, 2024 · But as far back as a decade ago in India, a startup called Appin Technology and its subsidiaries allegedly played a similar cyber-mercenary role ...
  70. [70]
    How Hacked Records Revealed Oath Keepers Ties With Police ...
    Oct 8, 2021 · The hacks have been made available to journalists through a transparency non-profit group called Distributed Denial of Secrets (DDoSecrets).
  71. [71]
    Anonymous hacked into Russia's top censorship agency to ... - Fortune
    Mar 11, 2022 · Distributed Denial of Secrets (DDoSecrets) published the originally stolen files by Anonymous hacktivists, who are trying to undermine Putin's ...
  72. [72]
    Opinion: Can Journalists Use Illegally Hacked Data? - The Click
    Logging onto the website Distributed Denial of Secrets (DDOS), my eyes were drawn to the only color on the screen ...
  73. [73]
    Glenn Greenwald rips former Intercept colleagues as 'liberal DNC ...
    May 4, 2021 · The data was leaked to the transparency collective Distributed Denial of Secrets (DDoSecrets) and was only provided to journalists and ...
  74. [74]
    Twitter bans account which leaked FBI and police documents
    Jun 24, 2020 · The account belonged to the Distributed Denial of Secrets (DDoSecrets) collective - its name a pun on the distributed denial of service cyber ...<|separator|>
  75. [75]
    Elon Musk's “Free Speech” Twitter Still Censoring DDoSecrets
    Nov 22, 2022 · Twitter has censored the website of nonprofit transparency collective Distributed Denial of Secrets for more than two years.
  76. [76]
    "Countering Violent Extremism, Terrorism, and Antisemitic Threats in ...
    In September 2021, the non-profit journalist collective Distributed Denial of Secrets released the membership database for the Oath Keepers organization.<|separator|>
  77. [77]
  78. [78]
    Feds are treating BlueLeaks organization as 'a criminal hacker ...
    Aug 13, 2020 · A bulletin distributed by the Department of Homeland Security describes Distributed Denial of Secrets (DDoSecrets) as a criminal hacker ...
  79. [79]
    BlueLeaks Hack Exposes Personal Data of 700,000 Cops
    Jul 15, 2020 · Local, state and federal law enforcement agencies had their own separate surveillance databases that possibly could have prevented the attacks, ...
  80. [80]
    'BlueLeaks' Exposes Files from Hundreds of Police Departments
    Jun 22, 2020 · The NFCA said it appears the data published by BlueLeaks was taken after a security breach at Netsential, a Houston-based web development firm.
  81. [81]
    BlueLeaks: Activist Group Publishes More Than 1 Million Police and ...
    On June 19, an activist group called Distributed Denial of Secrets (DDoSecrets) published a 270-gigabyte collection of sensitive documents exfiltrated from ...
  82. [82]
    'BlueLeaks' Hackers Do Data Dump, Expose U.S. Cops' Personal Info
    By Stephen Owsinski It has been a tumultuous few years for American law enforcement officers, especially lately, with anti-cop sentiments growing fangs and.
  83. [83]
    Ransomware Victims' Data Published via DDoSecrets - Dark Reading
    Jan 7, 2021 · Activists behind Distributed Denial of Secrets has shared 1TB of data pulled from Dark Web sites where it was shared by ransomware ...<|separator|>
  84. [84]
    BlueLeaks target public safety data files in disturbing hack attacks
    Jul 27, 2020 · BlueLeaks target public safety data files in disturbing hack attacks. What the leak of sensitive data from police forces in U.S. teaches the ...
  85. [85]
    The Oath Keepers Data Leak: Unmasking Extremism in Public Life
    Sep 6, 2022 · This report uses leaked Oath Keeper data to highlight the number of one-time and/or current Oath Keepers members or supporters holding ...
  86. [86]
    Leak exposes data on applicants to Heritage Foundation's Project ...
    Jun 18, 2025 · DDoSecrets cofounder Emma Best told SAN that “the mere existence of ... ideological purity,” Best said. This isn't the first time data ...
  87. [87]
    Paramilitary Leaks - Distributed Denial of Secrets
    Jan 6, 2025 · Over 200 gigabytes of chat logs and recordings from paramilitary groups and militias including American Patriots Three Percent (APIII) and the Oath Keepers.Missing: funding | Show results with:funding